IT Governance

Höfundur Michael Wallace; Lawrence J. Webber

Útgefandi Aspen Publishing

Snið Page Fidelity

Print ISBN 9781543836943

Útgáfa 0

Útgáfuár

83.490 kr.

Description

Efnisyfirlit

  • Highlights 2022 Edition
  • Title Page
  • Copyright
  • About the Authors
  • Contents
  • Preface
  • Part I OPERATING AND ORGANIZING THE BUSINESS
  • 1 IT GOVERNANCE: ALIGNING IT WITH THE BUSINESS
  • § 1.01 Overview
  • § 1.02 Legal Issues
  • § 1.03 IT Governance Models
  • § 1.04 IT Strategic Planning Process
  • 2 BUSINESS PROCESS MANAGEMENT: DEFINING YOUR BUSINESS
  • § 2.01 Overview
  • § 2.02 Building Your BPM Program
  • § 2.03 Process Analysis Tools
  • § 2.04 Simplifying a Process
  • 3 IT GOVERNANCE METRICS: MEASURING YOUR SUCCESS
  • § 3.01 Overview
  • § 3.02 Basics of IT Governance Metrics
  • § 3.03 Data Collection
  • § 3.04 Analyzing
  • § 3.05 Reporting
  • § 3.06 Managing a Governance Metrics Program
  • 4 ITIL: MEETING THE NEEDS OF BUSINESS
  • § 4.01 Overview
  • § 4.02 ITIL’s Framework
  • § 4.03 ITIL Service Operation
  • § 4.04 ITIL Service Delivery
  • § 4.05 ITIL Certification
  • § 4.06 ITIL as an Official Standard
  • § 4.07 Implementing ITIL
  • 5 IT QUALITY MANAGEMENT: THE KEY TO PREDICTABLE RESULTS
  • § 5.01 Overview
  • § 5.02 Start with a Quality Management Plan
  • § 5.03 Quality Assurance or Quality Control
  • § 5.04 Continuous Improvement
  • § 5.05 Major Quality Techniques
  • 6 POLICIES AND PROCEDURES: SETTING THE FRAMEWORK
  • § 6.01 Overview
  • § 6.02 Organizing a Manual
  • § 6.03 Setting the Standards for Responsibilities
  • § 6.04 IT Policy Approval Process
  • 7 BUSINESS IMPACT ANALYSIS: MEASURING RISK
  • § 7.01 Overview
  • § 7.02 Managing a Business Impact Analysis (BIA)
  • § 7.03 BIA Data Collection Process
  • § 7.04 Crunching the Data
  • § 7.05 BIA Results and the IT Department
  • § 7.06 Updates
  • 8 BUSINESS CONTINUITY PLANNING: STAYING IN BUSINESS
  • § 8.01 Overview
  • § 8.02 Prepare to Plan
  • § 8.03 Business Continuity Planning Basics
  • § 8.04 Planning—The Next Step
  • § 8.05 Writing a Plan
  • § 8.06 Third-Party Plan Certification
  • § 8.07 Sources of Additional Information
  • 9 IT AUDITS: STAYING IN COMPLIANCE
  • § 9.01 Overview
  • § 9.02 IT Management Audit
  • § 9.03 IT Legal Mandates and Records Retention
  • § 9.04 Resource Management
  • § 9.05 Programming Activities Control
  • § 9.06 Computer Operations
  • § 9.07 Data Networks
  • § 9.08 Disaster Recovery/Contingency Planning
  • § 9.09 Workstation Audit Issues
  • § 9.10 Strategies for Acing an Audit
  • 10 RISK MANAGEMENT: MANAGING THE UNEXPECTED
  • § 10.01 Overview
  • § 10.02 Risk Management Is a Process
  • § 10.03 Why Risk Management Fails
  • § 10.04 Business Continuity Planning as a Mitigation Technique
  • § 10.05 Implementing IT Risk Management
  • § 10.06 Process Resilience Through Risk Management
  • Part II OVERSEEING AND DIRECTING PROJECTS AND PEOPLE
  • 11 HUMAN RESOURCES: IT’S POOREST MANAGED ASSET
  • § 11.01 Overview
  • § 11.02 Recruiting, Reassignments, and Promotions
  • § 11.03 New Employee Orientation
  • § 11.04 Performance Review
  • § 11.05 Employee Development
  • § 11.06 Managing IT Training
  • § 11.07 Employee Communications
  • § 11.08 Employee Burnout
  • § 11.09 IT Employee Productivity
  • § 11.10 Nontraditional Working Arrangements
  • 12 IT STAFFING: A ZERO-BASED APPROACH
  • § 12.01 Overview
  • § 12.02 How Many People Do You Need?
  • § 12.03 What to Outsource?
  • § 12.04 Staffing Minimization Techniques
  • 13 VIRTUAL TEAMS: REMOTE CONTROL MANAGEMENT
  • § 13.01 Overview
  • § 13.02 The Virtual Company
  • § 13.03 Becoming a Virtual Worker
  • § 13.04 Virtual Workforce Strategy
  • § 13.05 Leading a Virtual Team
  • 14 REQUIREMENTS ANALYSIS: PLANNING FOR SUCCESS
  • § 14.01 Overview
  • § 14.02 Stakeholders Hold the Answers
  • § 14.03 Describing a Requirement
  • § 14.04 Assembling Specifications
  • § 14.05 Stakeholders Interviews
  • § 14.06 Validating Project Requirements
  • § 14.07 IT Special Teams Round Out the Specs
  • § 14.08 Modeling Your Requirements
  • 15 PROJECT MANAGEMENT: GETTING IT OUT ON TIME
  • § 15.01 Overview
  • § 15.02 Project Management Fundamentals
  • § 15.03 Important Elements of the Project Plan
  • § 15.04 Executing the Project
  • § 15.05 Project Closeout
  • § 15.06 Rolling Wave Management
  • § 15.07 Project Management Pitfalls
  • 16 PROJECT MANAGEMENT OFFICE: OPTIMIZING THE ORGANIZATION
  • § 16.01 Overview
  • § 16.02 Project Management Office Responsibilities
  • § 16.03 Managing the Project Portfolio
  • § 16.04 Ensuring Project Management Quality
  • 17 PROJECT PHASE REVIEWS: KEEPING EVERYTHING ON TRACK
  • § 17.01 Overview
  • § 17.02 Phase I—Business Case Phase Review
  • § 17.03 Phase II—Planning Phase Review
  • § 17.04 Phase III—Execution Phase Review
  • § 17.05 Phase IV—Project Implementation Phase Review
  • § 17.06 Phase V—Post Implementation Phase Review
  • 18 SOFTWARE DEVELOPMENT: SOLID PRACTICES
  • § 18.01 Overview
  • § 18.02 Software Development Process
  • § 18.03 Programming Methodologies
  • § 18.04 Programming Conventions
  • § 18.05 Software Acquisition
  • § 18.06 Program Testing
  • § 18.07 Software Deployment
  • § 18.08 Program Maintenance
  • 19 CUSTOMER SERVICE: MEETING EXPECTATIONS
  • § 19.01 Overview
  • § 19.02 What Is This ‘‘Thing’’ Called Customer Service?
  • § 19.03 Components of IT Service Staffing
  • § 19.04 Metrics—IT’s Measures of Success
  • § 19.05 Why Use a Customer Survey?
  • § 19.06 Translating Requirements into a Staff Level
  • 20 SERVICE LEVEL AGREEMENTS: MANAGING EXPECTATIONS
  • § 20.01 Overview
  • § 20.02 Types of SLA
  • § 20.03 Dimensions of an SLA
  • § 20.04 Making Your SLA Work for You
  • 21 CHANGE MANAGEMENT: KEEPING EVERYTHING UP TO DATE
  • § 21.01 Overview
  • § 21.02 Change Management Policy
  • § 21.03 Patch Management Policy
  • § 21.04 Patch Management Tools
  • 22 THE INTERNET: MAKING IT PRODUCTIVE
  • § 22.01 Overview
  • § 22.02 Methods of Internet Access
  • § 22.03 Internet Security
  • § 22.04 Internet Usage
  • § 22.05 Email Usage
  • § 22.06 Owning and Operating a Web Site: Liability Concerns
  • § 22.07 Acceptable Use Agreement
  • 23 WEB 2.0: SUPPORTING COLLABORATION
  • § 23.01 Overview
  • § 23.02 Collaborating Using Web 2.0
  • § 23.03 Social Networking
  • § 23.04 Other Collaboration Tools
  • 24 AGILE PROJECT MANAGEMENT: SOFTWARE AT THE SPEED OF BUSINESS
  • § 24.01 Overview
  • § 24.02 Cultivating an Agile Culture
  • § 24.03 Agile Stories
  • § 24.04 Agile Metrics
  • § 24.05 The Agile Development Cycle
  • § 24.06 Agile Frameworks
  • § 24.07 Scaling Agile
  • 25 DEVOPS: APPLICATIONS FROM START TO FINISH
  • § 25.01 Overview
  • § 25.02 DevOps Principles
  • § 25.03 DevOps Practices
  • § 25.04 DevOps Tools
  • 26 VENDORS: GETTING THE GOODS
  • § 26.01 Overview
  • § 26.02 Vendor Management
  • § 26.03 Play by the Rules
  • § 26.04 Consulting and Temporary Personnel Services
  • § 26.05 Requests for Proposal
  • Part III MANAGING AND OPTIMIZING INFRASTRUCTURE
  • 27 SERVICE DESK SUPPORT: HANDLING DAY-TO-DAY HASSLES
  • § 27.01 Overview
  • § 27.02 Role of the Service Desk
  • § 27.03 Establishing a Service Desk
  • § 27.04 The Proactive Service Desk
  • § 27.05 The Service Desk in a Disaster
  • 28 MANAGING IT ASSETS: IDENTIFY WHAT YOU HAVE
  • § 28.01 Overview
  • § 28.02 Lay the Groundwork
  • § 28.03 Conducting the Inventory
  • § 28.04 Software Asset Management
  • § 28.05 Software Assets
  • 29 MANAGING INNOVATION: CHOOSING THE RIGHT TOOL
  • § 29.01 Overview
  • § 29.02 Set the Foundation—An Asset Inventory
  • § 29.03 Creating an Innovation Strategy
  • § 29.04 Fostering a Climate for IT Innovation
  • § 29.05 Proposing New Items
  • § 29.06 Pitfalls
  • 30 PERSONAL COMPUTERS: MANAGING USER DEVICES
  • § 30.01 Overview
  • § 30.02 PC Support Manager
  • § 30.03 Acquisition Procedures
  • § 30.04 Operations Procedures
  • § 30.05 End-User Technical Support
  • 31 END-USER SYSTEMS: DO-IT-YOURSELF COMPUTING
  • § 31.01 Overview
  • § 31.02 The Problems with End-User Computing
  • § 31.03 Personal Computing vs. Corporate Computing
  • § 31.04 Managing a Proactive End-User Computing Program
  • § 31.05 End-User Policies
  • 32 NETWORK MANAGEMENT
  • § 32.01 Overview
  • § 32.02 Data Network
  • § 32.03 Digital Telephone
  • § 32.04 Assessing Network Risks
  • § 32.05 Network Security
  • § 32.06 Controlling Network Access
  • 33 INFORMATION SECURITY: ALL OF THE REST
  • § 33.01 Overview
  • § 33.02 Build/Enhance an Information Security Program
  • § 33.03 Identify the Critical Assets
  • § 33.04 How Much Risk Is Acceptable
  • § 33.05 Apply Security Everywhere
  • § 33.06 Incident Response Planning
  • § 33.07 People Are the Problem
  • § 33.08 Raise the Defenses
  • § 33.09 Certifications
  • 34 DATA BACKUPS: THE KEY TO A PROMPT RECOVERY
  • § 34.01 Overview
  • § 34.02 Data Recovery
  • § 34.03 Data Backups—Major Responsibilities
  • § 34.04 Designing for Backups
  • § 34.05 Media Handling, Transportation, and Storage
  • § 34.06 Workstation, Notebook PC, and Data Collection Station Backups
  • § 34.07 Data Retention and Legal Mandates
  • 35 OPEN SOURCE: MANAGING ISSUES
  • § 35.01 Overview
  • § 35.02 Consider All of the Costs
  • § 35.03 Licensing
  • § 35.04 Server Systems
  • § 35.05 Applications Software
  • § 35.06 Manage the Process
  • 36 VIRTUALIZATION: OPTIMIZING RESOURCES
  • § 36.01 Overview
  • § 36.02 Server Virtualization
  • § 36.03 Desktop Virtualization
  • § 36.04 Application Virtualization
  • § 36.05 Storage Virtualization
  • 37 CLOUD COMPUTING: INFRASTRUCTURE ALTERNATIVES
  • § 37.01 Overview
  • § 37.02 Cloud Computing
  • § 37.03 Disaster Recovery as a Service (DRaaS)
  • § 37.04 Cloud Computing Vendor Selection Process
  • § 37.05 Cloud Computing Vendor Management
  • § 37.06 Fog Computing: The Edge of the Internet
  • Part IV BUILDING AND SHARING KNOWLEDGE
  • 38 DOCUMENTATION: GETTING EVERYONE ON THE SAME PAGE
  • § 38.01 Overview
  • § 38.02 Developing a Reference Documentation Policy
  • § 38.03 Document Formats
  • § 38.04 Document Management
  • § 38.05 System Reference Instructions
  • § 38.06 Project Documentation
  • § 38.07 Systems Analysis Documentation
  • § 38.08 Flowcharting Standards
  • 39 DATA MANAGEMENT: TAKING CARE OF CORPORATE INFORMATION
  • § 39.01 Overview
  • § 39.02 Issues Relating to Data
  • § 39.03 Access to Data
  • § 39.04 Protecting Employee Data
  • 40 BIG DATA: CAPTURING ALL OF YOUR DATA
  • § 40.01 Overview
  • § 40.02 Data Governance Strategy
  • § 40.03 Business Intelligence
  • § 40.04 Big Data
  • 41 DOCUMENT MANAGEMENT: CAPTURING CORPORATE KNOWLEDGE
  • § 41.01 Overview
  • § 41.02 Capture and Storage
  • § 41.03 Retrieval and Collaboration
  • § 41.04 Printing and Archiving
  • § 41.05 Designing a Solution
  • 42 IT TRAINING: BUILDING THE RIGHT SKILLS
  • § 42.01 Overview
  • § 42.02 Training for Immediate Requirements
  • § 42.03 Training the Crew
  • § 42.04 Managing Training
  • 43 PROTECTING THE COMPANY’S INTELLECTUAL PROPERTY
  • § 43.01 Overview
  • § 43.02 First Address the Basics
  • § 43.03 Addressing a Security Breach
  • § 43.04 Employee Education
  • § 43.05 Evaluating Technical Solutions
  • 44 GOVERNING THE INTERNET OF THINGS (IoT)
  • § 44.01 Overview
  • § 44.02 The Challenges of IoT
  • § 44.03 Raise Your Defenses
  • Appendix A DATA BREACH NOTIFICATION LAWS BY STATE
  • Alabama
  • Alaska
  • Arizona
  • Arkansas
  • California
  • Colorado
  • Connecticut
  • Delaware
  • District of Columbia
  • Florida
  • Georgia
  • Hawaii
  • Idaho
  • Illinois
  • Indiana
  • Iowa
  • Kansas
  • Kentucky
  • Louisiana
  • Maine
  • Maryland
  • Massachusetts
  • Michigan
  • Minnesota
  • Mississippi
  • Missouri
  • Montana
  • Nebraska
  • Nevada
  • New Hampshire
  • New Jersey
  • New Mexico
  • New York
  • North Carolina
  • North Dakota
  • Ohio
  • Oklahoma
  • Oregon
  • Pennsylvania
  • Rhode Island
  • South Carolina
  • South Dakota
  • Tennessee
  • Texas
  • Utah
  • Vermont
  • Virginia
  • Washington
  • West Virginia
  • Wisconsin
  • Wyoming
  • Guam
  • Puerto Rico
  • Virgin Islands
  • Appendix B CASE SUMMARIES
  • Glossary of IT Terms
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • J
  • K
  • L
  • M
  • N
  • O
  • P
  • R
  • S
  • T
  • U
  • V
  • W
  • X
  • Z
Show More

Additional information

Veldu vöru

Rafbók til eignar

Aðrar vörur

1
    1
    Karfan þín
    Afghanistan
    Afghanistan
    Veldu vöru:

    Rafbók til eignar

    1 X 6.790 kr. = 6.790 kr.